The simulations of pressurized water reactor (PWR) nuclear power plant (NPP) is a very important domain in the society of nuclear power, and there are several problems with the current PWR-NPP simulations. First, the current physical modeling of PWR is over-simplified which can bring convenience of implementation, while severe inaccuracy is prone to be incurred at some critical situation. Second, ...
View full abstract»

Temporal aspects have a vital importance while dealing with the verification of critical systems. Time constraints may reflect both security and performance requirements. Thereby, verifying the temporal requirements is a major task in the validation of critical systems. In this paper, we discuss a new approach for the specification of the temporal requirements within complex systems. We also sketc...
View full abstract»

The main idea of this paper is to develop an adequate computational model under which the agents in the formation will perform to coordinate among each other. The IDs of the agents are assigned in such a way that those will be very useful in real-time application. The proposed scheme is suitable for obstacle avoidance in unknown environment as the agents adjust themselves to have more space during...
View full abstract»

System of systems deployed in dynamic, adaptable environments represent the potential for the generation of great value, power and functionality. The great potential associated with system of systems deployment is offset by the increased complexity associated with the system of systems design, development, deployment, operation and disposal. This paper explores the connection between classical sys...
View full abstract»

Modern cars comprise tens of electronic control units, interconnected via automotive bus systems towards a specific system-of-systems inside the vehicle. Safety-relevant applications which are realized by these networked embedded controllers require a sophisticated process of system design. The appropriate choice of communication infrastructure and parameters at an early stage of system developmen...
View full abstract»

Maritime transportation system (MTS) is a critical infrastructure system that enables economic activity through transferring goods between national and international destinations and hence, is extremely important for the U.S. National Security. This research applies a systems approach to define MTS as a system of systems (SoS). The presented definition of Maritime Transportation System of Systems ...
View full abstract»

Knee kinematics in the every daily life or during the sports activities attracts the considerable attentions. Advances in micro electro mechanical system technologies produce many types of mobile sensors. This article introduces a system-of-systems (SoS) which estimates the knee kinematics by integrating MARG sensor and pressure sensor. Each sensor is with miniature size, low power consumption and...
View full abstract»

Agent oriented methodologies have become one of the most important issues of software development. Several methodologies have been proposed to guide developers through various stages of agent based system development. Deciding which methodology to select in a specific case is a critical problem. This paper presents a framework to evaluate complexity of agent oriented methodologies with a quantitat...
View full abstract»

We use RuleML to write declassification policies that secure information exchanges between different security levels of disparate access control models. Such flows enable sharing task-critical information that would otherwise not be shared without human intervention. Using RuleML as a security policy specification language allows us to preserve the safety property of information flow across multip...
View full abstract»

This paper presents an online application which ties to the popular social network Facebook. It aggregates data from other systems, including Yahoo! Local and Google Maps, to provide relevant information to users. This system of systems functions as an add-on to each user's Facebook profile. The user is able to store ratings, reviews, and places where he likes to go. Our proposed system uses all t...
View full abstract»

We present a detailed case study of how DTGolog - a logic-based decision theoretic planner based on the language of situation calculus - can be adapted to solve a limited but common and useful form of hierarchical planning, and demonstrate how it can be applied to the task of intelligent robot programming and control.
View full abstract»

We report progress on constructing a physics of interdependence for human-robot-machine organizations. Until now, organizational theory has failed. Similarly, while organizations of agent-based models produce interesting results, they are not predictive. We are integrating mathematics and measurement into a new model of interdependence in organizations based on the conservation of information that...
View full abstract»

Peer-to-peer networks have been used efficiently as building blocks for large-scale distributed network applications in wired networks. With large scale wireless sensor networks becoming even more realistic, it is pertinent to build distributed network applications in WSNs as well. In this paper, we extend the peer-to-peer overlayed network to provide a platform for different distributed applicati...
View full abstract»

Whenever millions of data is being stored in database regularly, data mining is responsible to discover the hidden knowledge, rules and patterns from it. Data mining is going to be involved in every organization for extracting extra information which are not visible for everyone. Organizations always planning to get useful information from it. Though, study on customer relationship management (CRM...
View full abstract»

The term system of systems (SoS) has become a quite common expression with no single accepted definition. Based on analysis, five characteristics have been identified from an assortment of SoS descriptions. These characteristics are named autonomy, belonging, connectivity, diversity, and emergence, whose degrees of strength determines the foundation of any SoS. To utilize these characteristics, co...
View full abstract»

The promise of formal verification of system-of-systems is in harnessing the power and accuracy of modern day computers to create trust-worthy systems. The success of formal verification techniques depends, to large degree, on the existence of a sound and complete collection of formally written requirements. To date, there is no known methodology for assuring that a collection of requirements, for...
View full abstract»

This paper addresses the need for formal specification and high-level verification of requirements of complex reactive system of systems. It describes a technique and the associated TLtoSQL tool-set that consists of four plugins for the popular Eclipse environment: (i) a database tool that records JUnit tests in an JDBC compliant database, (ii) a graphical editor for propositional linear-time temp...
View full abstract»

Engineering design courses' content and timing have been the subject of debate for a long time. What is the appropriate content of an engineering design course and when is the appropriate time to introduce it in the curriculum? In this paper we present a look at a one semester junior level design course offered at New Mexico Tech, in which we propose a framework for introducing design in an engine...
View full abstract»

As software complexity continues to increase in today's systems of systems, conveyance of stakeholder requirements, development to these requirements, and validation of these requirements has become exceedingly more difficult. Safety-critical software-intensive systems of systems require significant verification to ensure that they function as per requirements. Verification is only one portion of ...
View full abstract»

This paper describes a system of systems for health care of elderly. The system consists of three systems: one is the system that detects heart rate and it provides the condition of autonomous nerve system. The second one is the system detecting respiration. Third one is the system detecting cough with phlegm to suction. In them we empty non-contacted three senors such as an ultrasonic oscillosens...
View full abstract»

In this paper we treat software evolution from the perspective of standards interoperability. We address the issue of how to apply contemporary software safety assurance standards to legacy safety-critical systems, with the aim of re-certifying the legacy systems to the contemporary standards. We present a model to capture the relationships between pre- and post-modification software and standards...
View full abstract»

In this paper we discuss the verification and validation of software architecture for system of systems. Software architecture plays a vital role in the systematic construction of large systems of systems; it defines the design space and provides a road map leading to the successful construction of system of systems that meet the functional and non-functional requirements. Moreover, a good archite...
View full abstract»

In this paper we address the need to increase the effectiveness and productivity of independent verification and validation (IV&V) of complex system-of-systems software via software reuse. We build upon our previous work on computer-aided IV&V techniques that advocate the use of a system reference model (SRM) to capture the IV&V team's understanding of the problem. An SRM is composed o...
View full abstract»

This paper describes a formal methods approach to process engineering. The approach involves statechart based formal process modeling as well as the use of embedded assertion statecharts to ensure the modeled process adheres to stated requirements. This approach can help the process engineer develop and maintain a process. The formal nature of our approach can also help the process engineer to rea...
View full abstract»

As multi-participant transactions migrate to Web services, there is a potential for some of these parties to not fulfill their obligations or to achieve unintended objectives. Preserving evidence of service behavior of all participating actors can resolve such shortcomings. In order to achieve that, we propose a three-layered framework to preserve evidence of service behaviors in a non-refutable w...
View full abstract»